Basic e-commerce technologies
E-commerce, or e-commerce, consists of technologies that involve making purchases or sales through various payment systems on the Internet and other computer networks.
To basic e-commerce technologies (technical, economic and legal bases) are:
1. Authentication of counterparties in e-commerce.
Authentication is an identification process that allows you to verify the identity of a party who wants to access online information (services). This procedure is carried out to ensure the security and guarantee the execution of transactions between categories of electronic commerce.
Authentication is based on the use of passwords for access to information (services), special cards, algorithms for electronic digital signatures, etc.
2. International standards and protocols.
Standards are a set of specifications,
guarantee the possibility of interaction between electronic commercial Internet systems.
Standard OFX is a standard for the electronic exchange of financial data between financial enterprises, businesses and consumers via the Internet. The main functions of the standard - transfer of funds, consumer payments, payments of legal entities, etc.The Internet Open Trading Protocol (IOTP) provides the joint functioning of various e-commerce systems for electronic trading operations.
UDDI is a generally accepted system of standards that will allow e-commerce systems to automate information exchange and transactions.
3. Web services.
Web service is a virtual agent that provides services via the Internet, a robot constantly present in the network, programmed to collect and filter the necessary information, search for counterparties (resources of a computer network that meet specified criteria), to perform certain actions.
This technology allows you to reduce the information load on the subjects of electronic commerce, improve the effectiveness of procedures for establishing contacts, conducting negotiations, making mutual settlements, etc.
4. Automated enterprise resource management systems.
Enterprise resource management systems in e-commerce are the basis for effective business communications. The introduction of these systems allows to optimize the economic processes of the enterprise and make the fullest use of the advantages of various e-commerce systems. In turn, the successful growth of e-commerce makes it especially important to introduce new systems for automation of enterprise resource management (MRP, MRP II, ERP, CSRP, etc.).
5. Legal support of electronic commerce.
Legal support of electronic commercial activity is determined by the specifics of the electronic environment of telecommunications. All transactions made in the Internet environment must comply with applicable law.
Netiquette ( from English Net - Net and Etiquette - etiquette, Netiquette) is a set of rules about the behavior of users on the network, as well as the traditions and culture of the Internet community, which adheres to the civilized majority. This concept appeared in the mid-80's. XX century.
There are certain rules that should be followed when working on the network. Nets are not universal and rigidly established, each network community forms its own rules. Usually the rules are fixed and even formalized in the form of a formal charter.
People who adhere to the rules of one network community can involuntarily break the rules of another. Therefore, practically in all Internet communities, they are required to familiarize themselves with the rules and express their formal consent to their observance. In addition, it is usually recommended, before sending your messages to the community, first read the existing sections, get acquainted with the spirit and atmosphere.
For clarity, examples of such rules are given:
Rule 1 . Remember that you are talking to a person. When you use telecommunications, you are dealing with only a monitor screen (here we are considering the process of holding teleconferences online). You do not see the interlocutor, do not fix the response to your words, you can not gesticulate, change the tone, and the expression of your face plays no role. When you conduct a dialogue by e-mail, in a chat or in a conference, you can very easily err in the interpretation of the words of the interlocutor. Put yourself in the place of the person with whom you speak. Defend your point of view, but do not offend the interlocutors. Do not do to others what you do not want in return.
Rule 2. Stick to the same standards of conduct as in real life. Behavior standards may vary from one location to another, but they are no less severe than in everyday life. If someone violates the law in virtual space, it usually violates the rules of network etiquette. Netiquette suggests that users should stay within the law in both real and virtual space.
Rule 3: Remember where you are on the Internet. Once in a new area of virtual space, first look around. Take the time to study the situation - listen to how and what people talk about. After that, enter into a dialogue with them.
Rule 4. Appreciate the time and opportunity of others. When you send an email or send a message to a conference, that time. And then you are responsible for ensuring that the addressee does not waste this time. The concept of capabilities - Not strongly regimented. To the capabilities it is necessary to attribute and such characteristic as the capacity of the communication channel. The word capabilities it is also appropriate to use it when speaking about the physical capacity of storage media on a remote computer. And if you accidentally sent five identical messages to the same conference, then you spent both the time of the subscribers of this conference and the means of the communication system. Before you send people your letter, think about whether they really need it. If you answer yourself "no", then it's better not to waste your and other people's time for nothing. If you are not sure, think twice before sending a message.
Flood ( from English, flood - flood) - these are messages in Internet forums and chats that take up large volumes and do not carry any useful information. Flood is distributed both for nothing to do, and for the purpose of gollipga (posting on the Internet (on forums, in discussion groups, in wiki-projects, LJ, etc.) provocative messages), for example, from the desire to annoy someone. Technical flood is a hacker attack with a large number of requests, leading to denial of service.
Rule 5: Save your face. Take advantage of anonymity. You will be judged by how you conduct the dialogue (communicate). Be aware of what you are talking about. Send only meaningful letters. Do not insult users. Be patient and polite. Do not use profanity, avoid conflicts.
Rule 6. Help others where possible. Many people who know the answer to your questions read your questions. If only a few people qualified to respond, the total amount of knowledge on the Web will increase. It is especially important to exchange answers to your questions with other users. Sharing experiences is an exciting activity. This is the old and glorious tradition of the Network.
Rule 7. Do not get involved in conflicts and do not allow them. Flames ( - flame ) - are emotional remarks often expressed without regard to the opinions of other participants in the conversation . This is a message where delicacy is not the most important thing, and the goal is to trigger a user response. Flames are also an old tradition of the Web. Flames can be fun for writers and readers alike. But the netiquette against the flames, which develop into protracted conflicts, is a series of vicious messages that are exchanged, as a rule, by two or three participants in the discussion. Such wars can literally smash the mood of the conference and destroy the friendly atmosphere. In fact, there is an unacceptable monopolization of resources.
Rule 8: Respect the right to private correspondence. Do not read messages that are not intended for you. Disrespect for the secrecy of correspondence is not only a sign of bad manners. In the future, this can lead to problems in real life.
Rule 9. Do not abuse your capabilities. Some people in the virtual space feel professional. Possessing more knowledge than other users, or having more powers, these users automatically gain an advantage. However, this does not mean that they can abuse it. For example, system administrators should not read private e-mail messages, but sometimes they read them for one reason or another.
Rule 10. Learn to forgive others of their mistakes. When someone makes a mistake - be it a misspelled word, careless flame, stupid question or an unreasonably long answer - be lenient towards this. If you have good manners, this does not mean that you have a license to impose these manners on everyone else. If you decide to draw the user's attention to his (or her) error, do it correctly and better not at the conference, but in a private letter.
Rule 11 . Do not install the software on the user's computer without first obtaining its consent.
Also We Can Offer!
- Argumentative essay
- Best college essays
- Buy custom essays online
- Buy essay online
- Cheap essay
- Cheap essay writing service
- Cheap writing service
- College essay
- College essay introduction
- College essay writing service
- Compare and contrast essay
- Custom essay
- Custom essay writing service
- Custom essays writing services
- Death penalty essay
- Do my essay
- Essay about love
- Essay about yourself
- Essay help
- Essay writing help
- Essay writing service reviews
- Essays online
- Fast food essay
- George orwell essays
- Human rights essay
- Narrative essay
- Pay to write essay
- Personal essay for college
- Personal narrative essay
- Persuasive writing
- Write my essay
- Write my essay for me cheap
- Writing a scholarship essay